vendor:
TWiki
by:
SecurityFocus
7.5
CVSS
HIGH
Command Execution
78
CWE
Product Name: TWiki
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
TWiki Command Execution Vulnerability
TWiki is prone to a vulnerability that attackers can leverage to execute arbitrary commands in the context of the application. This issue occurs because the application fails to adequately sanitize user-supplied input. Successful attacks can compromise the affected application and possibly the underlying computer. Enter the following in the application's search box: %SEARCH{ date="P`pr -?`" search="xyzzy" }%
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized.